Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleNovember 2024
Time Machine: An Efficient and Backend-Migratable Architecture for Defending Against Ransomware in the Hypervisor
- Jian-Syue Huang,
- Tsung-Han Liu,
- Yi-Hsien Chen,
- Hsuan-Yu Peng,
- Tse-Wei Huang,
- Chin-Laung Lei,
- Chun-Ying Huang
CCSW '24: Proceedings of the 2024 on Cloud Computing Security WorkshopPages 66–79https://doi.org/10.1145/3689938.3694780Ransomware has caused escalating financial losses for individuals and companies, increasing annually. To combat this, we present Time Machine, a real-time, fine-grained sector-level live view navigation solution designed to safeguard filesystems from ...
- research-articleNovember 2023
Travelling the Hypervisor and SSD: A Tag-Based Approach Against Crypto Ransomware with Fine-Grained Data Recovery
CCS '23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications SecurityPages 341–355https://doi.org/10.1145/3576915.3616665Ransomware has evolved from an economic nuisance to a national security threat nowadays, which poses a significant risk to users. To address this problem, we propose RansomTag, a tag-based approach against crypto ransomware with fine-grained data ...
- research-articleSeptember 2023
Seeing the Invisible: Auditing eBPF Programs in Hypervisor with HyperBee
eBPF '23: Proceedings of the 1st Workshop on eBPF and Kernel ExtensionsPages 28–34https://doi.org/10.1145/3609021.3609305The flexibility of eBPF makes it widely used in performance, security, and monitoring. However, this flexibility is a double-edged sword, allowing attackers to use eBPF for malicious purposes. Security researchers have discovered multiple backdoors ...
- research-articleJune 2023
What virtualization can do for maintenance: the HSM case
SysTEX '23: Proceedings of the 6th Workshop on System Software for Trusted ExecutionPages 20–26https://doi.org/10.1145/3578359.3593035In the automotive sector, one easily looks into two decades of software maintenance at the vehicle level. During this time, either the processor-specific version of the potentially complex operating system (OS) kernel in use has to be patched or ...
- research-articleJune 2023
On the Measurement of Performance Metrics for Virtualization-Enhanced Architectures
SAC '23: Proceedings of the 38th ACM/SIGAPP Symposium on Applied ComputingPages 49–56https://doi.org/10.1145/3555776.3577705Cloud computing facilitates resource sharing among multiple users. Although sharing leads to the effective utilization of resources, it raises many security concerns. Hence, virtualization-enabled processors, which are used in cloud computing, are ...
-
- research-articleNovember 2022
HyperDbg: Reinventing Hardware-Assisted Debugging
- Mohammad Sina Karvandi,
- MohammadHosein Gholamrezaei,
- Saleh Khalaj Monfared,
- Soroush Meghdadizanjani,
- Behrooz Abbassi,
- Ali Amini,
- Reza Mortazavi,
- Saeid Gorgin,
- Dara Rahmati,
- Michael Schwarz
CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications SecurityPages 1709–1723https://doi.org/10.1145/3548606.3560649Software analysis, debugging, and reverse engineering have a crucial impact in today's software industry. Efficient and stealthy debuggers are especially relevant for malware analysis. However, existing debugging platforms fail to address a transparent, ...
- research-articleNovember 2022
Want more unikernels?: inflate them!
SoCC '22: Proceedings of the 13th Symposium on Cloud ComputingPages 510–525https://doi.org/10.1145/3542929.3563473Unikernels are on the rise in the cloud. These lightweight virtual machines (VMs) specialized to a single application offer the same level of isolation as full-blown VMs, while providing performance superior to standard Linux-based VMs or even to ...
- research-articleMay 2022
Transpose-xen: virtualized mixed-criticality through dynamic allocation
SAC '22: Proceedings of the 37th ACM/SIGAPP Symposium on Applied ComputingPages 3–12https://doi.org/10.1145/3477314.3506979Cloud systems continue to rise in popularity due to their ability to provide access to flexible, scalable systems to be shared among all their users. Several tasks can be executed simultaneously within a server, but have varying requirements for ...
- research-articleMarch 2022
Kite: lightweight critical service domains
EuroSys '22: Proceedings of the Seventeenth European Conference on Computer SystemsPages 384–401https://doi.org/10.1145/3492321.3519586Converged multi-level secure (MLS) systems, such as Qubes OS or SecureView, heavily rely on virtualization and service virtual machines (VMs). Traditionally, driver domains - isolated VMs that run device drivers - and daemon VMs use full-blown general-...
- research-articleJanuary 2022
An eagle's eye view of software defined network function virtualisation
International Journal of Internet Technology and Secured Transactions (IJITST), Volume 12, Issue 2Pages 161–183https://doi.org/10.1504/ijitst.2022.121421The operational and capital costs of diverse proprietary network appliances are increasing day by day. It is causing problems of network ossification for service providers. Service providers are under pressure to offer these network services while keeping ...
- research-articleJanuary 2022
ExOShim: preventing memory disclosure using execute-only kernel code
International Journal of Information and Computer Security (IJICS), Volume 17, Issue 1-2Pages 57–82https://doi.org/10.1504/ijics.2022.121291Information leakage and memory disclosure are major threats to the security in modern computer systems. If an attacker is able to obtain the binary-code of an application, it is possible to reverse-engineer the source-code, uncover vulnerabilities, craft ...
- research-articleNovember 2021Best Paper
V-Shuttle: Scalable and Semantics-Aware Hypervisor Virtual Device Fuzzing
- Gaoning Pan,
- Xingwei Lin,
- Xuhong Zhang,
- Yongkang Jia,
- Shouling Ji,
- Chunming Wu,
- Xinlei Ying,
- Jiashui Wang,
- Yanjun Wu
CCS '21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications SecurityPages 2197–2213https://doi.org/10.1145/3460120.3484811With the wide application and deployment of cloud computing in enterprises, virtualization developers and security researchers are paying more attention to cloud computing security. The core component of cloud computing products is the hypervisor, which ...
- research-articleNovember 2021
HyperFuzzer: An Efficient Hybrid Fuzzer for Virtual CPUs
CCS '21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications SecurityPages 366–378https://doi.org/10.1145/3460120.3484748In this cloud computing era, the security of hypervisors is critical to the overall security of the cloud. In particular, the security of CPU virtualization in hypervisors is paramount because it is implemented in the most privileged CPU mode. Blackbox ...
- research-articleNovember 2020
The hyplet: joining a program and a nanovisor for real-time and performance
SummerSim '20: Proceedings of the 2020 Summer Simulation ConferenceArticle No.: 41, Pages 1–8This paper presents the concept of sharing a hypervisor address space with a standard Linux program. In this work, we add hypervisor awareness to the Linux kernel and execute code in the HYP exception level through using the hyplet. The hyplet is an ...
- research-articleMay 2020
A Retargetable System-level DBT Hypervisor
ACM Transactions on Computer Systems (TOCS), Volume 36, Issue 4Article No.: 14, Pages 1–24https://doi.org/10.1145/3386161System-level Dynamic Binary Translation (DBT) provides the capability to boot an Operating System (OS) and execute programs compiled for an Instruction Set Architecture (ISA) different from that of the host machine. Due to their performance-critical ...
- surveyMay 2020
Security Issues and Challenges for Virtualization Technologies
ACM Computing Surveys (CSUR), Volume 53, Issue 2Article No.: 45, Pages 1–37https://doi.org/10.1145/3382190Virtualization-based technologies have become ubiquitous in computing. While they provide an easy-to-implement platform for scalable, high-availability services, they also introduce new security issues. Traditionally, discussions on security ...
- research-articleApril 2020
Design of a symbolically executable embedded hypervisor
EuroSys '20: Proceedings of the Fifteenth European Conference on Computer SystemsArticle No.: 6, Pages 1–16https://doi.org/10.1145/3342195.3387516Hypervisor implementations such as XMHF, Nova, PROSPER, prplHypervisor, the various L4 descendants, as well as KVM and Xen offer mechanisms for dynamic startup and reconfiguration, including the allocation, delegation and destruction of objects and ...
- research-articleMarch 2020
Write-protection enforcement: hypervisor-backed kernel hardening
SAC '20: Proceedings of the 35th Annual ACM Symposium on Applied ComputingPages 1736–1744https://doi.org/10.1145/3341105.3373919A rootkit is a piece of code that aims to manipulate the computer behaviour without being detected. Rootkits are mainly used to disable kernel self-protection, hide malware presence, provide a covert communication channel between malware and their ...
- research-articleMarch 2020
Directvisor: virtualization for bare-metal cloud
VEE '20: Proceedings of the 16th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution EnvironmentsPages 45–58https://doi.org/10.1145/3381052.3381317Bare-metal cloud platforms allow customers to rent remote physical servers and install their preferred operating systems and software to make the best of servers' raw hardware capabilities. However, this quest for bare-metal performance compromises ...
- research-articleJune 2020
A distributed safety mechanism using middleware and hypervisors for autonomous vehicles
- Tjerk Bijlsma,
- Andrii Buriachevskyi,
- Alessandro Frigerio,
- Yuting Fu,
- Kees Goossens,
- Ali Osman Örs,
- Pieter J. van der Perk,
- Andrei Terechko,
- Bart Vermeulen
DATE '20: Proceedings of the 23rd Conference on Design, Automation and Test in EuropePages 1175–1180Autonomous vehicles use cyber-physical systems to provide comfort and safety to passengers. Design of safety mechanisms for such systems is hindered by the growing quantity and complexity of SoCs (System-on-a-Chip) and software stacks required for ...